Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2836: Vulnerability in Cloudflare https://github.com/cloudflare/pingora

0
High
VulnerabilityCVE-2026-2836cvecve-2026-2836
Published: Wed Mar 04 2026 (03/04/2026, 23:44:56 UTC)
Source: CVE Database V5
Vendor/Project: Cloudflare
Product: https://github.com/cloudflare/pingora

Description

A cache poisoning vulnerability has been found in the Pingora HTTP proxy framework’s default cache key construction. The issue occurs because the default HTTP cache key implementation generates cache keys using only the URI path, excluding critical factors such as the host header (authority). Operators relying on the default are vulnerable to cache poisoning, and cross-origin responses may be improperly served to users. Impact This vulnerability affects users of Pingora's alpha proxy caching feature who relied on the default CacheKey implementation. An attacker could exploit this for: * Cross-tenant data leakage: In multi-tenant deployments, poison the cache so that users from one tenant receive cached responses from another tenant * Cache poisoning attacks: Serve malicious content to legitimate users by poisoning shared cache entries Cloudflare's CDN infrastructure was not affected by this vulnerability, as Cloudflare's default cache key implementation uses multiple factors to prevent cache key poisoning and never made use of the previously provided default. Mitigation: We strongly recommend Pingora users to upgrade to Pingora v0.8.0 or higher, which removes the insecure default cache key implementation. Users must now explicitly implement their own callback that includes appropriate factors such as Host header, origin server HTTP scheme, and other attributes their cache should vary on. Pingora users on previous versions may also remove any of their default CacheKey usage and implement their own that should at minimum include the host header / authority and upstream peer’s HTTP scheme.

AI-Powered Analysis

AILast updated: 03/05/2026, 00:17:33 UTC

Technical Analysis

CVE-2026-2836 identifies a cache poisoning vulnerability in the Pingora HTTP proxy framework, specifically in its default cache key construction used in the alpha proxy caching feature. The vulnerability arises because the default cache key implementation generates keys solely based on the URI path, omitting critical components such as the host header (authority) and the upstream peer’s HTTP scheme. This flawed design allows an attacker to poison the cache by injecting malicious or cross-origin responses that are then served to other users, potentially from different tenants in multi-tenant deployments. The impact includes cross-tenant data leakage, where one tenant may receive cached responses intended for another, and cache poisoning attacks that can deliver malicious content to legitimate users. Cloudflare’s own CDN infrastructure is unaffected as it employs a more comprehensive cache key strategy that incorporates multiple factors to prevent such poisoning. The vulnerability affects Pingora versions prior to 0.8.0, which used the insecure default cache key. Exploitation requires no privileges and no authentication but does require user interaction (e.g., triggering cached requests). The CVSS 4.0 score is 8.4 (high), reflecting the ease of exploitation and significant confidentiality and integrity impacts. Mitigation requires upgrading to Pingora v0.8.0 or later, which removes the insecure default and mandates explicit cache key callback implementations that include the host header, HTTP scheme, and other relevant attributes. Users on earlier versions should replace default cache key usage with custom implementations that at minimum consider the host header and upstream peer scheme to prevent cache poisoning.

Potential Impact

The vulnerability poses a significant risk to organizations using Pingora’s alpha proxy caching feature with default cache key settings, especially in multi-tenant environments. Attackers can exploit this flaw to poison caches, leading to cross-tenant data leakage where sensitive information from one tenant is exposed to another. Additionally, cache poisoning can be used to serve malicious content to legitimate users, potentially facilitating phishing, malware distribution, or other attacks. This undermines the confidentiality and integrity of cached data and can damage trust in the affected services. Since the vulnerability requires no privileges and no authentication, it can be exploited by remote attackers with minimal barriers, increasing the risk of widespread abuse. However, the scope is limited to deployments using the vulnerable Pingora versions and default cache key implementations. Cloudflare’s own CDN infrastructure is not impacted, limiting the risk to third-party users of Pingora. Organizations relying on Pingora for HTTP proxy caching must address this vulnerability promptly to avoid data leakage and malicious content delivery.

Mitigation Recommendations

1. Upgrade immediately to Pingora version 0.8.0 or higher, which removes the insecure default cache key implementation. 2. For users unable to upgrade promptly, remove any usage of the default CacheKey implementation and develop a custom cache key callback that includes at minimum the host header (authority) and the upstream peer’s HTTP scheme. 3. Ensure that cache keys vary on all relevant HTTP request attributes that distinguish tenants or origins, such as Host header, scheme, and any other headers or parameters critical to cache partitioning. 4. Conduct thorough testing of cache behavior after implementing custom cache keys to verify that cross-origin or cross-tenant cache poisoning is not possible. 5. Monitor proxy logs for unusual cache hits or responses that may indicate attempted cache poisoning. 6. Educate development and operations teams about the importance of proper cache key construction in proxy caching to prevent similar vulnerabilities. 7. Review and audit other caching layers or proxies in the environment to ensure they do not suffer from similar cache key construction issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cloudflare
Date Reserved
2026-02-19T21:33:42.425Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a8c847d1a09e29cb860502

Added to database: 3/5/2026, 12:03:19 AM

Last enriched: 3/5/2026, 12:17:33 AM

Last updated: 3/5/2026, 3:23:56 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses